indetectables-net / teorias-numeradasLinks
Mirror de las teorias numeradas del sitio de Narvaja
☆21Updated last month
Alternatives and similar repositories for teorias-numeradas
Users that are interested in teorias-numeradas are comparing it to the libraries listed below
Sorting:
- A keygen for Specter Insight C2☆33Updated 5 months ago
- RedTeam Resources By Pwn3rzs / CyberArsenal / C0UNT1NGST4ARS☆31Updated last year
- A reference of Windows API function calls, including functions for file operations, process management, memory management, thread managem…☆106Updated last year
- Golang tool to help in forcing a license for HAK5 C2 Tool☆51Updated last year
- Conjunto de manuales para reversa/analisis/cracking☆62Updated 3 years ago
- CompMgmtLauncher & Sharepoint DLL Search Order hijacking UAC/persist via OneDrive☆107Updated 2 years ago
- An easy to install and easy to run tool for generating exploit payloads for CVE-2023-38831, WinRAR RCE before versions 6.23☆115Updated last year
- Bypass Malware Sandbox Evasion Ram check☆137Updated 2 years ago
- This is a simple example of DLL hijacking enabling proxy execution.☆66Updated 2 years ago
- Lockbit3.0 Microsoft Defender MpClient.dll DLL Hijacking PoC☆177Updated 2 years ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Updated last year
- PowerShell Asynchronous TCP Reverse Shell☆158Updated last year
- elevate to SYSTEM any way we can! Metasploit and PSEXEC getsystem alternative☆374Updated last year
- A simple Sleepmask BOF example☆131Updated last month
- 🐍 Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.☆158Updated last year
- ☆40Updated last year
- Execute shellcode files with rundll32☆205Updated last year
- Extract C2 Traffic☆250Updated 7 months ago
- ☆128Updated 3 months ago
- Advanced Python Code Obfuscation Suite with Military-Grade Encryption and Anti-Reverse Engineering Features☆151Updated 4 months ago
- Neton is a tool for getting information from Internet connected sandboxes☆95Updated 2 years ago
- Collection of various WINAPI tricks / features used or abused by Malware☆13Updated 3 years ago
- 「🛡️」AVs/EDRs Evasion tool☆102Updated 7 months ago
- Windows_AFD_LPE_CVE-2023-21768☆52Updated last year
- Just a simple silly PoC demonstrating executable "exe" file that can be used like exe, dll or shellcode...☆157Updated 10 months ago
- Malware indetectable, with AV bypass techniques, anti-disassembly, etc.☆98Updated 5 years ago
- WindowSpy is a Cobalt Strike Beacon Object File meant for automated and targeted user surveillance.☆278Updated 4 months ago
- Reproducing Spyboy technique, which involves terminating all EDR/XDR/AVs processes by abusing the zam64.sys driver☆276Updated 2 months ago
- ☆105Updated 2 years ago
- Memory Scaner☆63Updated 2 years ago